Articles
How to query sensors for helpful metrics
Discover the sensors that already exist on your systems, learn how to query their information, and add them to your metrics dashboard.
Synchronize passwords in KeePass
Usernames and passwords play an important role in security. In this article, we show you how to set up the KeePass password manager and keep it synchronized across multiple devices.
Manage projects in SMEs with OpenProject
OpenProject supplies sensible, comprehensive project management for SMEs with few financial inputs.
Detect failures and ensure high availability
Eliminate single points of failure and service downtime with the DRBD distributed replicated storage system and the Corosync and Pacemaker service.
OpenCanary attack detection
The canary in a coal mine has made its way metaphorically into IT security with the OpenCanary honeypot for detecting attacks.
An open source object storage solution
We introduce the MinIO high-performance object store, its key features and applications, and some performance tips.
Test your system to help fight phishing attacks
The Gophish phishing framework lets you set up your own phishing campaigns to identify vulnerabilities and make users aware of these dangers.
Run your own chat server
The Matrix open standard implements secure, decentralized communication and comes with bridges to popular chat apps.
Secure microservices with centralized zero trust
SPIFFE and SPIRE put strong workload identities at the center of a zero-trust architecture. They improve reliability and security by taking the responsibility for identity creation and management away from individual services and workloads.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.